2002
DOI: 10.1016/s0140-3664(02)00037-3
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection techniques and approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
81
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 202 publications
(84 citation statements)
references
References 7 publications
0
81
0
Order By: Relevance
“…Traditionally, intrusions detection systems are based on socalled signature methods [2,3]. These methods usually consist of applications that are the set of rules declared by an expert or a security officer.…”
Section: Related Workmentioning
confidence: 99%
“…Traditionally, intrusions detection systems are based on socalled signature methods [2,3]. These methods usually consist of applications that are the set of rules declared by an expert or a security officer.…”
Section: Related Workmentioning
confidence: 99%
“…While the phrase of every individuality, that is, instance network or system loosely defined, there is a large amount of partiality in which exactly establishes cyber terrorism. In an attempt to define cyber terrorism more logically (Theuns and Ray, 2002) a study is made of explanations and characteristics of terrorism and terrorist based actions. According to Symantec characteristics a list of characteristics for outdated as well as updated level of terrorism is developed.…”
Section: Introductionmentioning
confidence: 99%
“…IDSs monitor the activity of the network with the purpose of identifying intrusive events and can take actions to abort these risky events. A wide range of techniques have been used to build IDSs, most of the reported and described in previous surveys [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15].…”
Section: Introductionmentioning
confidence: 99%